Google, the energy saver! Energy efficiency of Google products

January 17, 2009 0 Comments 0 tags

n a wired finding by a Harvard researcher, Google search generates 7 grams of carbon dioxide (CO2), slightly less than half as much CO2 as boiling a kettle for a

Yet another simple Google Docs hack

January 17, 2009 0 Comments 0 tags

A simple hack that allow you to edit read only Google docs is explained here http://googlesystem.blogspot.com/2009/01/copy-google-documents-to-your-account.html It works and all you need is to hack the url a bit like

Wi-Fi Network Loopholes That Hackers Exploit – Plug Them and Avoid Troubles!

January 17, 2009 0 Comments 0 tags

With the increasing number of wi-fi home or small office networks mushrooming all over the place, the hackers are having a field day. The hackers break-in at will and carry

Hackers note to Windows Defender’s Team in Zlob Trojan source code

January 17, 2009 0 Comments 0 tags

Russian hacker has sent a note to the windows defender team. It’s discovered by a French analyst while analyzing the variant of the Zlob Trojan. The original note below. “For

Zlob hacker writes love letter to Microsoft

January 13, 2009 0 Comments 0 tags

Here’s a new way to get Microsoft to pay attention to you: slip a brief message into the malicious Trojan horse program you just wrote. That’s what an unnamed Russian

How to Remove Windows Genuine Advantage Notifications

January 5, 2009 0 Comments 0 tags

Windows genuine advantage notifications occur when your computer hasn’t passed the validation test. The validation test can be failed due to being sold a pirated (non-genuine) copy of XP, or

Complete MySQL Injection

January 2, 2009 0 Comments 0 tags

Credit go to sam207 TABLE OF CONTENT: #INTRO #WHAT IS DATABASE? #WHAT IS SQL INJECTION? #BYPASSING LOGINS #ACCESSING SECRET DATA #Checking for vulnerability #Find the number of columns #Addressing vulnerable